Baking security into a switch
- 17 January, 2008 08:36
I read a little about Cisco's TrustSec architecture, and I'm wondering if it's something we should take a look at. It seems like getting more security built into a switch is a good idea, but I can't tell how realistic that idea is yet.
A lot of the ideas behind the Cisco Trusted Security architecture make a lot of sense and are worth exploring in more detail. I've been talking to several enterprises lately about their business needs and how the LAN needs to change to support those needs. In some cases, there's a lot of overlap between those enterprises' concerns and the ideas in Cisco TrustSec.
For example, the focus on identity and roles helps solve a lot of business issues. Companies are struggling to apply policies to users in a more automated fashion, so the idea of role-based or identity-based networking has a lot of appeal. Cisco's discussion of TrustSec detailed many of the challenges of using VLANs and ACLs to try to separate users on the LAN and apply policies to what they can access. The enterprises I've been talking to echo that sentiment, talking about how hard it was to keep up with their changing and diverse workforce with the limited tools of VLANs and ACLs.
Some ideas these enterprises focused on, though, go beyond what Cisco has talked about to date with TrustSec. For example, along with knowing a user's identity and role, it's also very helpful to know the application a user is trying to run and have that information be part of the policy decision about whether that user flow should be allowed to cross the network. In most cases, the intelligence must include all three - user, role, and application - to truly deliver the business context of what the user is doing on the LAN.
The other issue that these enterprises are talking about is the network location for applying that intelligence. They talk about how their applications, and in particular their traffic patterns, are changing. Less and less of their traffic is following the classic hub-and-spoke design; more applications run directly between users now, with peer-to-peer applications such as Instant Messaging on the rise.
As a result, these enterprises recognize they need intelligence about the user, role, and application right at the edge of the LAN, where users connect into the network. So access switches need an architecture able to deliver this intelligence for user and application control. Enterprises I've talked to are looking at switch upgrade cycles as the time to migrate to these capabilities in the wiring closet.
So to your question of whether TrustSec is something to look at, the broader answer is that when you face your next switch refresh, you need to take a look at the full set of emerging switches that provide a lot more than basic Layer 3/Layer 4 forwarding - those that can provide you more business intelligence at the edge of your LAN.
Indeed, a lot of changes are coming to LAN infrastructure now, and not just from Cisco. Rumors are flying these days about several other announcements - many expected just this month - and the thinking is that the switching landscape will look very different very soon.
So stay tuned for more focus on and innovation in delivering intelligence directly into the LAN and in more places within the LAN.
Join the Computerworld Australia group on Linkedin. The group is open to IT Directors, IT Managers, Infrastructure Managers, Network Managers, Security Managers, Communications Managers.
Verizon, Jennifer Lopez partner on Latino-focused wireless stores
Santos migrates to Windows 7 before XP support ends
Australia remains black spot for Vodafone
WikiLeaks Party closer to registering
AusCERT 2013: NBN users need security professionals’ help, says Google